Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 23:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
85c3b09ed6b8045d15b5a71fdffdd9bc748c04099f77a990e786cc6c125ba4b2.exe
Resource
win7-20240704-en
5 signatures
150 seconds
General
-
Target
85c3b09ed6b8045d15b5a71fdffdd9bc748c04099f77a990e786cc6c125ba4b2.exe
-
Size
107KB
-
MD5
0a5c55c0001724de20a941904ab84aea
-
SHA1
bd761c8b1e91799acd0dc60b2510a15e75c0ee1a
-
SHA256
85c3b09ed6b8045d15b5a71fdffdd9bc748c04099f77a990e786cc6c125ba4b2
-
SHA512
cedcdaebc1513b534293adc18fc82a7e42d54fca797caeab24021e6096b71880f92cbd685566650c894bbe9f5aab3e01a46ddd00fa5f14490ca9ce10b7ecb2e0
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDoTNKDeS98hPUdHV7RNzfJN7pFX:ymb3NkkiQ3mdBjFo5KDe88g1fD7jX
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
Processes:
resource yara_rule behavioral2/memory/2532-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4524-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2404-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4912-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/464-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4940-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1568-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4672-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4748-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1236-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1460-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3712-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3460-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2768-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3144-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4772-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3556-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5080-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4908-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2860-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4584-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4220-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3892-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2176-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4364-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4364-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3700-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
7djjd.exexrxrlfx.exeffxrrrl.exe9hbtnn.exejvppj.exejppvd.exerllfrrl.exerllflfl.exenntntt.exennbhnn.exe9pddv.exefxxrllf.exexlrxlrx.exehhbthn.exentnthh.exedjvpd.exelffllrr.exeflrlfxr.exehbhtth.exe3jpjj.exepjjjd.exerlrrxrx.exehnttbb.exebtthbb.exejjdpp.exerxllrrx.exefrfxxfx.exetnttbh.exeppdvv.exedjdjp.exefrxlfxl.exebbtnbt.exethbttt.exevvpvd.exefxrrllf.exe5rxxrrr.exehttnhn.exejvdvj.exepvvjv.exeflfrlxl.exexrllfll.exenbbtnh.exebnnhth.exepdvjd.exevpjdd.exexfxrffx.exe3ntnnn.exepdjdv.exepdpjd.exe7rxxxll.exe7xlxffr.exe5hnhbt.exehthbtt.exedddpp.exedvvvp.exefrlfffl.exerxlfxxr.exebbbnnn.exebtnbhb.exejpvpj.exepppvj.exefflfxrl.exefxfxfxf.exentnhhb.exepid process 3700 7djjd.exe 4524 xrxrlfx.exe 4364 ffxrrrl.exe 2176 9hbtnn.exe 3892 jvppj.exe 4220 jppvd.exe 4584 rllfrrl.exe 2860 rllflfl.exe 2404 nntntt.exe 4912 nnbhnn.exe 4908 9pddv.exe 5080 fxxrllf.exe 3556 xlrxlrx.exe 464 hhbthn.exe 4772 ntnthh.exe 3144 djvpd.exe 2768 lffllrr.exe 3460 flrlfxr.exe 3712 hbhtth.exe 4728 3jpjj.exe 1460 pjjjd.exe 3248 rlrrxrx.exe 4940 hnttbb.exe 1940 btthbb.exe 1568 jjdpp.exe 1872 rxllrrx.exe 4672 frfxxfx.exe 4748 tnttbh.exe 1588 ppdvv.exe 3360 djdjp.exe 1236 frxlfxl.exe 428 bbtnbt.exe 436 thbttt.exe 3120 vvpvd.exe 1636 fxrrllf.exe 5060 5rxxrrr.exe 1148 httnhn.exe 4372 jvdvj.exe 4312 pvvjv.exe 1120 flfrlxl.exe 3700 xrllfll.exe 3972 nbbtnh.exe 2424 bnnhth.exe 3100 pdvjd.exe 1740 vpjdd.exe 4764 xfxrffx.exe 2432 3ntnnn.exe 4584 pdjdv.exe 4144 pdpjd.exe 4036 7rxxxll.exe 4956 7xlxffr.exe 3160 5hnhbt.exe 3552 hthbtt.exe 4864 dddpp.exe 3936 dvvvp.exe 3204 frlfffl.exe 3208 rxlfxxr.exe 4404 bbbnnn.exe 2864 btnbhb.exe 2368 jpvpj.exe 3144 pppvj.exe 4556 fflfxrl.exe 3224 fxfxfxf.exe 1144 ntnhhb.exe -
Processes:
resource yara_rule behavioral2/memory/2532-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4524-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2404-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4912-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/464-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4940-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1568-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4672-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4748-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1236-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1460-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3712-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3460-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2768-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3144-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4772-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3556-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5080-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4908-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2860-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4584-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4220-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3892-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2176-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4364-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4364-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4364-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3700-10-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
85c3b09ed6b8045d15b5a71fdffdd9bc748c04099f77a990e786cc6c125ba4b2.exe7djjd.exexrxrlfx.exeffxrrrl.exe9hbtnn.exejvppj.exejppvd.exerllfrrl.exerllflfl.exenntntt.exennbhnn.exe9pddv.exefxxrllf.exexlrxlrx.exehhbthn.exentnthh.exedjvpd.exelffllrr.exeflrlfxr.exehbhtth.exe3jpjj.exepjjjd.exedescription pid process target process PID 2532 wrote to memory of 3700 2532 85c3b09ed6b8045d15b5a71fdffdd9bc748c04099f77a990e786cc6c125ba4b2.exe xrllfll.exe PID 2532 wrote to memory of 3700 2532 85c3b09ed6b8045d15b5a71fdffdd9bc748c04099f77a990e786cc6c125ba4b2.exe xrllfll.exe PID 2532 wrote to memory of 3700 2532 85c3b09ed6b8045d15b5a71fdffdd9bc748c04099f77a990e786cc6c125ba4b2.exe xrllfll.exe PID 3700 wrote to memory of 4524 3700 7djjd.exe xrxrlfx.exe PID 3700 wrote to memory of 4524 3700 7djjd.exe xrxrlfx.exe PID 3700 wrote to memory of 4524 3700 7djjd.exe xrxrlfx.exe PID 4524 wrote to memory of 4364 4524 xrxrlfx.exe ffxrrrl.exe PID 4524 wrote to memory of 4364 4524 xrxrlfx.exe ffxrrrl.exe PID 4524 wrote to memory of 4364 4524 xrxrlfx.exe ffxrrrl.exe PID 4364 wrote to memory of 2176 4364 ffxrrrl.exe 9hbtnn.exe PID 4364 wrote to memory of 2176 4364 ffxrrrl.exe 9hbtnn.exe PID 4364 wrote to memory of 2176 4364 ffxrrrl.exe 9hbtnn.exe PID 2176 wrote to memory of 3892 2176 9hbtnn.exe jvppj.exe PID 2176 wrote to memory of 3892 2176 9hbtnn.exe jvppj.exe PID 2176 wrote to memory of 3892 2176 9hbtnn.exe jvppj.exe PID 3892 wrote to memory of 4220 3892 jvppj.exe jppvd.exe PID 3892 wrote to memory of 4220 3892 jvppj.exe jppvd.exe PID 3892 wrote to memory of 4220 3892 jvppj.exe jppvd.exe PID 4220 wrote to memory of 4584 4220 jppvd.exe pdjdv.exe PID 4220 wrote to memory of 4584 4220 jppvd.exe pdjdv.exe PID 4220 wrote to memory of 4584 4220 jppvd.exe pdjdv.exe PID 4584 wrote to memory of 2860 4584 rllfrrl.exe rllflfl.exe PID 4584 wrote to memory of 2860 4584 rllfrrl.exe rllflfl.exe PID 4584 wrote to memory of 2860 4584 rllfrrl.exe rllflfl.exe PID 2860 wrote to memory of 2404 2860 rllflfl.exe nntntt.exe PID 2860 wrote to memory of 2404 2860 rllflfl.exe nntntt.exe PID 2860 wrote to memory of 2404 2860 rllflfl.exe nntntt.exe PID 2404 wrote to memory of 4912 2404 nntntt.exe nnbhnn.exe PID 2404 wrote to memory of 4912 2404 nntntt.exe nnbhnn.exe PID 2404 wrote to memory of 4912 2404 nntntt.exe nnbhnn.exe PID 4912 wrote to memory of 4908 4912 nnbhnn.exe 9pddv.exe PID 4912 wrote to memory of 4908 4912 nnbhnn.exe 9pddv.exe PID 4912 wrote to memory of 4908 4912 nnbhnn.exe 9pddv.exe PID 4908 wrote to memory of 5080 4908 9pddv.exe fxxrllf.exe PID 4908 wrote to memory of 5080 4908 9pddv.exe fxxrllf.exe PID 4908 wrote to memory of 5080 4908 9pddv.exe fxxrllf.exe PID 5080 wrote to memory of 3556 5080 fxxrllf.exe xlrxlrx.exe PID 5080 wrote to memory of 3556 5080 fxxrllf.exe xlrxlrx.exe PID 5080 wrote to memory of 3556 5080 fxxrllf.exe xlrxlrx.exe PID 3556 wrote to memory of 464 3556 xlrxlrx.exe hhbthn.exe PID 3556 wrote to memory of 464 3556 xlrxlrx.exe hhbthn.exe PID 3556 wrote to memory of 464 3556 xlrxlrx.exe hhbthn.exe PID 464 wrote to memory of 4772 464 hhbthn.exe ntnthh.exe PID 464 wrote to memory of 4772 464 hhbthn.exe ntnthh.exe PID 464 wrote to memory of 4772 464 hhbthn.exe ntnthh.exe PID 4772 wrote to memory of 3144 4772 ntnthh.exe pppvj.exe PID 4772 wrote to memory of 3144 4772 ntnthh.exe pppvj.exe PID 4772 wrote to memory of 3144 4772 ntnthh.exe pppvj.exe PID 3144 wrote to memory of 2768 3144 djvpd.exe lffllrr.exe PID 3144 wrote to memory of 2768 3144 djvpd.exe lffllrr.exe PID 3144 wrote to memory of 2768 3144 djvpd.exe lffllrr.exe PID 2768 wrote to memory of 3460 2768 lffllrr.exe flrlfxr.exe PID 2768 wrote to memory of 3460 2768 lffllrr.exe flrlfxr.exe PID 2768 wrote to memory of 3460 2768 lffllrr.exe flrlfxr.exe PID 3460 wrote to memory of 3712 3460 flrlfxr.exe hbhtth.exe PID 3460 wrote to memory of 3712 3460 flrlfxr.exe hbhtth.exe PID 3460 wrote to memory of 3712 3460 flrlfxr.exe hbhtth.exe PID 3712 wrote to memory of 4728 3712 hbhtth.exe 3jpjj.exe PID 3712 wrote to memory of 4728 3712 hbhtth.exe 3jpjj.exe PID 3712 wrote to memory of 4728 3712 hbhtth.exe 3jpjj.exe PID 4728 wrote to memory of 1460 4728 3jpjj.exe pjjjd.exe PID 4728 wrote to memory of 1460 4728 3jpjj.exe pjjjd.exe PID 4728 wrote to memory of 1460 4728 3jpjj.exe pjjjd.exe PID 1460 wrote to memory of 3248 1460 pjjjd.exe fxrlfxr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\85c3b09ed6b8045d15b5a71fdffdd9bc748c04099f77a990e786cc6c125ba4b2.exe"C:\Users\Admin\AppData\Local\Temp\85c3b09ed6b8045d15b5a71fdffdd9bc748c04099f77a990e786cc6c125ba4b2.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\7djjd.exec:\7djjd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrxrlfx.exec:\xrxrlfx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ffxrrrl.exec:\ffxrrrl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9hbtnn.exec:\9hbtnn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jvppj.exec:\jvppj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jppvd.exec:\jppvd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rllfrrl.exec:\rllfrrl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rllflfl.exec:\rllflfl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nntntt.exec:\nntntt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnbhnn.exec:\nnbhnn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9pddv.exec:\9pddv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxxrllf.exec:\fxxrllf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xlrxlrx.exec:\xlrxlrx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hhbthn.exec:\hhbthn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ntnthh.exec:\ntnthh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\djvpd.exec:\djvpd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lffllrr.exec:\lffllrr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\flrlfxr.exec:\flrlfxr.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbhtth.exec:\hbhtth.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3jpjj.exec:\3jpjj.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjjjd.exec:\pjjjd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rlrrxrx.exec:\rlrrxrx.exe23⤵
- Executes dropped EXE
-
\??\c:\hnttbb.exec:\hnttbb.exe24⤵
- Executes dropped EXE
-
\??\c:\btthbb.exec:\btthbb.exe25⤵
- Executes dropped EXE
-
\??\c:\jjdpp.exec:\jjdpp.exe26⤵
- Executes dropped EXE
-
\??\c:\rxllrrx.exec:\rxllrrx.exe27⤵
- Executes dropped EXE
-
\??\c:\frfxxfx.exec:\frfxxfx.exe28⤵
- Executes dropped EXE
-
\??\c:\tnttbh.exec:\tnttbh.exe29⤵
- Executes dropped EXE
-
\??\c:\ppdvv.exec:\ppdvv.exe30⤵
- Executes dropped EXE
-
\??\c:\djdjp.exec:\djdjp.exe31⤵
- Executes dropped EXE
-
\??\c:\frxlfxl.exec:\frxlfxl.exe32⤵
- Executes dropped EXE
-
\??\c:\bbtnbt.exec:\bbtnbt.exe33⤵
- Executes dropped EXE
-
\??\c:\thbttt.exec:\thbttt.exe34⤵
- Executes dropped EXE
-
\??\c:\vvpvd.exec:\vvpvd.exe35⤵
- Executes dropped EXE
-
\??\c:\fxrrllf.exec:\fxrrllf.exe36⤵
- Executes dropped EXE
-
\??\c:\5rxxrrr.exec:\5rxxrrr.exe37⤵
- Executes dropped EXE
-
\??\c:\httnhn.exec:\httnhn.exe38⤵
- Executes dropped EXE
-
\??\c:\jvdvj.exec:\jvdvj.exe39⤵
- Executes dropped EXE
-
\??\c:\pvvjv.exec:\pvvjv.exe40⤵
- Executes dropped EXE
-
\??\c:\flfrlxl.exec:\flfrlxl.exe41⤵
- Executes dropped EXE
-
\??\c:\xrllfll.exec:\xrllfll.exe42⤵
- Executes dropped EXE
-
\??\c:\nbbtnh.exec:\nbbtnh.exe43⤵
- Executes dropped EXE
-
\??\c:\bnnhth.exec:\bnnhth.exe44⤵
- Executes dropped EXE
-
\??\c:\pdvjd.exec:\pdvjd.exe45⤵
- Executes dropped EXE
-
\??\c:\vpjdd.exec:\vpjdd.exe46⤵
- Executes dropped EXE
-
\??\c:\xfxrffx.exec:\xfxrffx.exe47⤵
- Executes dropped EXE
-
\??\c:\3ntnnn.exec:\3ntnnn.exe48⤵
- Executes dropped EXE
-
\??\c:\pdjdv.exec:\pdjdv.exe49⤵
- Executes dropped EXE
-
\??\c:\pdpjd.exec:\pdpjd.exe50⤵
- Executes dropped EXE
-
\??\c:\7rxxxll.exec:\7rxxxll.exe51⤵
- Executes dropped EXE
-
\??\c:\7xlxffr.exec:\7xlxffr.exe52⤵
- Executes dropped EXE
-
\??\c:\5hnhbt.exec:\5hnhbt.exe53⤵
- Executes dropped EXE
-
\??\c:\hthbtt.exec:\hthbtt.exe54⤵
- Executes dropped EXE
-
\??\c:\dddpp.exec:\dddpp.exe55⤵
- Executes dropped EXE
-
\??\c:\dvvvp.exec:\dvvvp.exe56⤵
- Executes dropped EXE
-
\??\c:\frlfffl.exec:\frlfffl.exe57⤵
- Executes dropped EXE
-
\??\c:\rxlfxxr.exec:\rxlfxxr.exe58⤵
- Executes dropped EXE
-
\??\c:\bbbnnn.exec:\bbbnnn.exe59⤵
- Executes dropped EXE
-
\??\c:\btnbhb.exec:\btnbhb.exe60⤵
- Executes dropped EXE
-
\??\c:\jpvpj.exec:\jpvpj.exe61⤵
- Executes dropped EXE
-
\??\c:\pppvj.exec:\pppvj.exe62⤵
- Executes dropped EXE
-
\??\c:\fflfxrl.exec:\fflfxrl.exe63⤵
- Executes dropped EXE
-
\??\c:\fxfxfxf.exec:\fxfxfxf.exe64⤵
- Executes dropped EXE
-
\??\c:\ntnhhb.exec:\ntnhhb.exe65⤵
- Executes dropped EXE
-
\??\c:\pdddp.exec:\pdddp.exe66⤵
-
\??\c:\pjjdp.exec:\pjjdp.exe67⤵
-
\??\c:\5rlffff.exec:\5rlffff.exe68⤵
-
\??\c:\fxllrrx.exec:\fxllrrx.exe69⤵
-
\??\c:\fxrlfxr.exec:\fxrlfxr.exe70⤵
-
\??\c:\thhbbb.exec:\thhbbb.exe71⤵
-
\??\c:\5tbthh.exec:\5tbthh.exe72⤵
-
\??\c:\jdvdv.exec:\jdvdv.exe73⤵
-
\??\c:\rrxrxrr.exec:\rrxrxrr.exe74⤵
-
\??\c:\bbhbtn.exec:\bbhbtn.exe75⤵
-
\??\c:\httnnn.exec:\httnnn.exe76⤵
-
\??\c:\pjppd.exec:\pjppd.exe77⤵
-
\??\c:\flrlfll.exec:\flrlfll.exe78⤵
-
\??\c:\5rxfllr.exec:\5rxfllr.exe79⤵
-
\??\c:\nnttnh.exec:\nnttnh.exe80⤵
-
\??\c:\dvjdv.exec:\dvjdv.exe81⤵
-
\??\c:\5xxrlfx.exec:\5xxrlfx.exe82⤵
-
\??\c:\nnhhbb.exec:\nnhhbb.exe83⤵
-
\??\c:\3hhbtt.exec:\3hhbtt.exe84⤵
-
\??\c:\5rrlffx.exec:\5rrlffx.exe85⤵
-
\??\c:\flxxrll.exec:\flxxrll.exe86⤵
-
\??\c:\ttbhbb.exec:\ttbhbb.exe87⤵
-
\??\c:\flffrfr.exec:\flffrfr.exe88⤵
-
\??\c:\bntttn.exec:\bntttn.exe89⤵
-
\??\c:\lrffxxr.exec:\lrffxxr.exe90⤵
-
\??\c:\1bhhbb.exec:\1bhhbb.exe91⤵
-
\??\c:\1vvvj.exec:\1vvvj.exe92⤵
-
\??\c:\vpjdv.exec:\vpjdv.exe93⤵
-
\??\c:\7rxrlll.exec:\7rxrlll.exe94⤵
-
\??\c:\tnnhbh.exec:\tnnhbh.exe95⤵
-
\??\c:\hnnnnh.exec:\hnnnnh.exe96⤵
-
\??\c:\frxrffx.exec:\frxrffx.exe97⤵
-
\??\c:\ntnnnt.exec:\ntnnnt.exe98⤵
-
\??\c:\3tnbtn.exec:\3tnbtn.exe99⤵
-
\??\c:\rlrxrxf.exec:\rlrxrxf.exe100⤵
-
\??\c:\jdjjp.exec:\jdjjp.exe101⤵
-
\??\c:\5xlfffl.exec:\5xlfffl.exe102⤵
-
\??\c:\vdvdd.exec:\vdvdd.exe103⤵
-
\??\c:\ddjdv.exec:\ddjdv.exe104⤵
-
\??\c:\ttnhhn.exec:\ttnhhn.exe105⤵
-
\??\c:\5ppjv.exec:\5ppjv.exe106⤵
-
\??\c:\7vddd.exec:\7vddd.exe107⤵
-
\??\c:\fxflxrl.exec:\fxflxrl.exe108⤵
-
\??\c:\lllfffx.exec:\lllfffx.exe109⤵
-
\??\c:\bhntnh.exec:\bhntnh.exe110⤵
-
\??\c:\ppdvp.exec:\ppdvp.exe111⤵
-
\??\c:\hbtnhn.exec:\hbtnhn.exe112⤵
-
\??\c:\btbttt.exec:\btbttt.exe113⤵
-
\??\c:\7rfrfll.exec:\7rfrfll.exe114⤵
-
\??\c:\lxfxrrr.exec:\lxfxrrr.exe115⤵
-
\??\c:\tbbhbb.exec:\tbbhbb.exe116⤵
-
\??\c:\nttttt.exec:\nttttt.exe117⤵
-
\??\c:\pjjjp.exec:\pjjjp.exe118⤵
-
\??\c:\pddvj.exec:\pddvj.exe119⤵
-
\??\c:\7flfffl.exec:\7flfffl.exe120⤵
-
\??\c:\hbtnhh.exec:\hbtnhh.exe121⤵
-
\??\c:\hbhbbn.exec:\hbhbbn.exe122⤵
-
\??\c:\dvvpj.exec:\dvvpj.exe123⤵
-
\??\c:\djjvp.exec:\djjvp.exe124⤵
-
\??\c:\rxlfxfx.exec:\rxlfxfx.exe125⤵
-
\??\c:\1tbtbt.exec:\1tbtbt.exe126⤵
-
\??\c:\bhntnn.exec:\bhntnn.exe127⤵
-
\??\c:\pdpdj.exec:\pdpdj.exe128⤵
-
\??\c:\llxxlxl.exec:\llxxlxl.exe129⤵
-
\??\c:\lxlfllf.exec:\lxlfllf.exe130⤵
-
\??\c:\nthnbn.exec:\nthnbn.exe131⤵
-
\??\c:\thnnbh.exec:\thnnbh.exe132⤵
-
\??\c:\djvpj.exec:\djvpj.exe133⤵
-
\??\c:\3flfffx.exec:\3flfffx.exe134⤵
-
\??\c:\rfffxxx.exec:\rfffxxx.exe135⤵
-
\??\c:\7bbttn.exec:\7bbttn.exe136⤵
-
\??\c:\nhbhbh.exec:\nhbhbh.exe137⤵
-
\??\c:\dppjd.exec:\dppjd.exe138⤵
-
\??\c:\xrlrlff.exec:\xrlrlff.exe139⤵
-
\??\c:\tnttbb.exec:\tnttbb.exe140⤵
-
\??\c:\htbtnn.exec:\htbtnn.exe141⤵
-
\??\c:\1djdj.exec:\1djdj.exe142⤵
-
\??\c:\pvjjv.exec:\pvjjv.exe143⤵
-
\??\c:\rfffrrr.exec:\rfffrrr.exe144⤵
-
\??\c:\7lxrrxf.exec:\7lxrrxf.exe145⤵
-
\??\c:\htthhb.exec:\htthhb.exe146⤵
-
\??\c:\dvdvv.exec:\dvdvv.exe147⤵
-
\??\c:\lllxrxr.exec:\lllxrxr.exe148⤵
-
\??\c:\fllxlfl.exec:\fllxlfl.exe149⤵
-
\??\c:\hhnnhh.exec:\hhnnhh.exe150⤵
-
\??\c:\dpvpp.exec:\dpvpp.exe151⤵
-
\??\c:\5llfrrl.exec:\5llfrrl.exe152⤵
-
\??\c:\lxfxrrl.exec:\lxfxrrl.exe153⤵
-
\??\c:\9ntnhb.exec:\9ntnhb.exe154⤵
-
\??\c:\1ttnbb.exec:\1ttnbb.exe155⤵
-
\??\c:\1vddd.exec:\1vddd.exe156⤵
-
\??\c:\7vvpj.exec:\7vvpj.exe157⤵
-
\??\c:\xlxxllf.exec:\xlxxllf.exe158⤵
-
\??\c:\3xfxrrl.exec:\3xfxrrl.exe159⤵
-
\??\c:\htbthb.exec:\htbthb.exe160⤵
-
\??\c:\nbhbbh.exec:\nbhbbh.exe161⤵
-
\??\c:\vjjjd.exec:\vjjjd.exe162⤵
-
\??\c:\vpppj.exec:\vpppj.exe163⤵
-
\??\c:\9flfllx.exec:\9flfllx.exe164⤵
-
\??\c:\lxffxxr.exec:\lxffxxr.exe165⤵
-
\??\c:\bttbtn.exec:\bttbtn.exe166⤵
-
\??\c:\ppvvp.exec:\ppvvp.exe167⤵
-
\??\c:\7jpjj.exec:\7jpjj.exe168⤵
-
\??\c:\flxlffx.exec:\flxlffx.exe169⤵
-
\??\c:\rlxlxrl.exec:\rlxlxrl.exe170⤵
-
\??\c:\nntnnn.exec:\nntnnn.exe171⤵
-
\??\c:\pjjdv.exec:\pjjdv.exe172⤵
-
\??\c:\djjpj.exec:\djjpj.exe173⤵
-
\??\c:\frrllff.exec:\frrllff.exe174⤵
-
\??\c:\9lxrxfl.exec:\9lxrxfl.exe175⤵
-
\??\c:\hnhntb.exec:\hnhntb.exe176⤵
-
\??\c:\btbtnn.exec:\btbtnn.exe177⤵
-
\??\c:\btnhtb.exec:\btnhtb.exe178⤵
-
\??\c:\jvdvd.exec:\jvdvd.exe179⤵
-
\??\c:\rrrrfff.exec:\rrrrfff.exe180⤵
-
\??\c:\ttbhnt.exec:\ttbhnt.exe181⤵
-
\??\c:\bbnhtt.exec:\bbnhtt.exe182⤵
-
\??\c:\jvppp.exec:\jvppp.exe183⤵
-
\??\c:\fflxrrx.exec:\fflxrrx.exe184⤵
-
\??\c:\xrxxflx.exec:\xrxxflx.exe185⤵
-
\??\c:\tthbtt.exec:\tthbtt.exe186⤵
-
\??\c:\7nbtnn.exec:\7nbtnn.exe187⤵
-
\??\c:\jdvpp.exec:\jdvpp.exe188⤵
-
\??\c:\xfxxrxr.exec:\xfxxrxr.exe189⤵
-
\??\c:\7xxfxxx.exec:\7xxfxxx.exe190⤵
-
\??\c:\tbbtnn.exec:\tbbtnn.exe191⤵
-
\??\c:\thbthb.exec:\thbthb.exe192⤵
-
\??\c:\vpdvv.exec:\vpdvv.exe193⤵
-
\??\c:\vppvj.exec:\vppvj.exe194⤵
-
\??\c:\9xfrlxr.exec:\9xfrlxr.exe195⤵
-
\??\c:\hhtnhb.exec:\hhtnhb.exe196⤵
-
\??\c:\bbhntb.exec:\bbhntb.exe197⤵
-
\??\c:\9pvdp.exec:\9pvdp.exe198⤵
-
\??\c:\pvvpp.exec:\pvvpp.exe199⤵
-
\??\c:\rffrlrl.exec:\rffrlrl.exe200⤵
-
\??\c:\nbtnht.exec:\nbtnht.exe201⤵
-
\??\c:\tbnbhb.exec:\tbnbhb.exe202⤵
-
\??\c:\pvjdd.exec:\pvjdd.exe203⤵
-
\??\c:\llfrlxl.exec:\llfrlxl.exe204⤵
-
\??\c:\rlrfrrf.exec:\rlrfrrf.exe205⤵
-
\??\c:\thnbtn.exec:\thnbtn.exe206⤵
-
\??\c:\thhtht.exec:\thhtht.exe207⤵
-
\??\c:\ppjpv.exec:\ppjpv.exe208⤵
-
\??\c:\1dpjd.exec:\1dpjd.exe209⤵
-
\??\c:\rfxfxxl.exec:\rfxfxxl.exe210⤵
-
\??\c:\rllxfxr.exec:\rllxfxr.exe211⤵
-
\??\c:\tbhbnn.exec:\tbhbnn.exe212⤵
-
\??\c:\ppjdd.exec:\ppjdd.exe213⤵
-
\??\c:\5pvpj.exec:\5pvpj.exe214⤵
-
\??\c:\5xxxxrr.exec:\5xxxxrr.exe215⤵
-
\??\c:\lxffxxr.exec:\lxffxxr.exe216⤵
-
\??\c:\5nhbnn.exec:\5nhbnn.exe217⤵
-
\??\c:\nbbthb.exec:\nbbthb.exe218⤵
-
\??\c:\vvpjd.exec:\vvpjd.exe219⤵
-
\??\c:\pdjjd.exec:\pdjjd.exe220⤵
-
\??\c:\xxrlxxr.exec:\xxrlxxr.exe221⤵
-
\??\c:\lrxrlrl.exec:\lrxrlrl.exe222⤵
-
\??\c:\9ttntn.exec:\9ttntn.exe223⤵
-
\??\c:\tbtbnt.exec:\tbtbnt.exe224⤵
-
\??\c:\jjjjd.exec:\jjjjd.exe225⤵
-
\??\c:\ffxrllf.exec:\ffxrllf.exe226⤵
-
\??\c:\3flfxrl.exec:\3flfxrl.exe227⤵
-
\??\c:\3hbnbn.exec:\3hbnbn.exe228⤵
-
\??\c:\5bbtbb.exec:\5bbtbb.exe229⤵
-
\??\c:\djpvj.exec:\djpvj.exe230⤵
-
\??\c:\pdjdj.exec:\pdjdj.exe231⤵
-
\??\c:\xllxfff.exec:\xllxfff.exe232⤵
-
\??\c:\vpdvp.exec:\vpdvp.exe233⤵
-
\??\c:\ffrlxfl.exec:\ffrlxfl.exe234⤵
-
\??\c:\xlfrlrx.exec:\xlfrlrx.exe235⤵
-
\??\c:\lrxxrfl.exec:\lrxxrfl.exe236⤵
-
\??\c:\9bbbtn.exec:\9bbbtn.exe237⤵
-
\??\c:\ppppp.exec:\ppppp.exe238⤵
-
\??\c:\lrrlxxr.exec:\lrrlxxr.exe239⤵
-
\??\c:\frrfflr.exec:\frrfflr.exe240⤵
-
\??\c:\tnbttt.exec:\tnbttt.exe241⤵